Try this in about one hour actually, I just noticed blue parts of graphs
are missing since I rerun data collection twice today (yes, known bug, but
I usually do not run collection manually and then its not a problem)
On Fri, 17 Oct 2003 [EMAIL PROTECTED] wrote:
>
> As by-product of bogons p
every day and I'm also entering this all
into rrd database and once I have enough samples rrd graphs of how much
this statistics change will also be made available (but before such graphs
provide really good view there must be year worth of samples or more...)
--
William Leibzon
Elan Net
Hello all,
I've been working on creating bogon ip filtering system in order to stop
some of the dangerous activity that I've seen ip blocks not listed in
whois used for and now have first "milestone" to report. A complete
list of unallocated (bogon) ip space collected based on whois data from
Hello all,
I've been working on creating bogon ip filtering system in order to stop
some of the dangerous activity that I've seen ip blocks not listed in
whois used for and now have first "milestone" to report. A complete
list of unallocated (bogon) ip space collected based on whois data from
PED!
That miracle was BIND 9.2.3rc3, for which we are eternally grateful.
As I posted to NANOG on Tue, 23 Sep 2003 02:35:48 -0400:
William Allen Simpson wrote:
# Thought I'd mention that I helped setup BIND 9.2.3rc3 on a yellowdog
# linux powercomputing machine tonight. It worked.
I have to agree with Scott. Be professional.
Y'all can use tomato.net as examples if you want
(though actually that one belongs to buydomains.com,
which buys potentially resellable domain names.)
A more important concern is that they keep mentioning that they've
been talking to web users and lo
ely, the folks complaining
haven't the necessary skills to acquire the information nor do they
provide enough information to identify the ISP in question to query them.
And, as I noted previously, I am not experiencing any difficulties with
.org resolution via my name servers.
--
William Astle
fing
t also backfire - pushing Verisign to be even more
> agressive at taking advantage of their positioning).
>
We moved ours long ago (with the exception of a few customers that
inexplicably demanded to stay with VeriSign nee NetSol). I expect most
network savvy folk everywhere moved, too.
--
uct
> http://www.icann.org/tlds/agreements/verisign/registry-agmt-appi-com-25may01.htm
Also handy! Thanks!
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
so not
seeing any unusual behaviour with .org domain resolution from my name
servers.
--
William Astle
finger [EMAIL PROTECTED] for further information
Geek Code V3.12: GCS/M/S d- s+:+ !a C++ UL$ P++ L+++ !E W++ !N w--- !O
!M PS PE V-- Y+ PGP t+@ 5++ X !R tv+@ b+++@ !DI D? G e++ h+ y?
I will say most probably yes. I have seen this "problem"(?) on many
small business customers. The hard part is trying to explain that to
them.
-William
On Wed, 2003-10-15 at 17:16, Jean-Christophe Smith wrote:
> I noticed the verio filter policy, in relation to inbound:
> - In
Don't know for certain, but I announce from time-time singular /24s out
of my 64.x block (without announcing entire block, although at times
I'd announce entire block as two /20s well) and have seen no problems with
verio or anybody else.
On Wed, 15 Oct 2003, Jean-Christophe Smith wrote:
>
I don't know if Paul's system lets you log in twice,
so I can't check the survey questions,
but they asked approximately whether you were
- a registrar
- an ISP (or something like that)
- a WEB end-user.
The problem is that most Internet users aren't WEB end-users,
they're
001:: networks and then
after some time tell the users sorry we are not routing 3ffe:: anymore
since it was experimental only. I prefer telling them from the very
first time.)
--William
--
William Caban <[EMAIL PROTECTED]>
7;boys wanted the Confederate battle flag.
It was hard to imagine the hate going on there
I certainly was grateful for assistance from other NANOG members.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
nt greatly saddened me, as I would have
> thought that all on this list have suffered Denial of Service attacks,
> and understand the seriousness and severity of these attacks,
> obviously one of us doesn't get it.
> please contact me if you have questions regarding this incident.
>
I'd say you need to contact your FBI office.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
t funding, and would be willing to assist Mr.
Berkowitz in this endeavor.
> I hope to get to at least part of the ICANN meeting
>...
We need a raporteur to inform us how the ICANN meeting goes. Please?
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
laiming network operators and
designers had reviewed and approved the VeriSign changes. I recommend
that others only join neutral unaffiliated discussion lists.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
One soundbite which just came to me:
"What if the company which has the Yosemete restaraunt
consession put up a 300 foot rig and drilled for oil
behind the kitchen?"
-george william herbert
[EMAIL PROTECTED]
On Mon, 6 Oct 2003, Mike Tancsa wrote:
>
> The one that pisses me off more is
>
> http://news.com.com/2100-1038_3-5087139.html?tag=nefd_top
"Lewis said the company needs to make money from new services such as
SiteFinder, or it will not be able to protect the Net's critical
infrastructure. He
Times might
consider using Internet resources, such as email, to contact competent
persons. In addition to ICANN, the Internet Architecture Board (IAB)
and/or the North American Network Operators Group (NANOG) are some
places that such technical assistance might be available.
--
William Allen
uot;), 18 U.S.C. § 2511 et seq.; for unfair, unlawful,
misleading, fraudulent and deceptive business practices in violation of
California Business & Professions Code Section 17200 et seq.; and for
unjust enrichment. Plaintiffs seek declaratory and injunctive relief to
halt VeriSign's illegal acts
; id 84AFA636; Sun, 28 Sep 2003 22:22:14 -0400 (EDT)
>
Richard Jimmerson wrote:
>
> This issue is being looked into right now.
>
> Richard Jimmerson
> Director of Operations
> American Registry for Internet Numbers (ARIN)
>
--
William Allen Simpson
Key finger
From: Claudio Gutiérrez [mailto:[EMAIL PROTECTED]
> I think http://datec.web.att.com/faqs/telecom.htm is an internal AT&T webserver
Arrgh..You're correct, and I should have noticed.
It's the 1996 FAQ for Telecom Digest,
Message-ID: <[EMAIL PROTECTED]>
TELECOM Digest - Frequently Asked Quest
Pete Templin wrote:
> Very rusty memory cells on this, but I think the mileage is
> 0.1 * sqrt ((delta-V)^2 + (delta-H)^2)).
> That's assuming same LATA, IIRC.
Close. It's
sqrt ( 0.1 * ((delta-V)^2 + (delta-H)^2)) )
and it doesn't care about LATAs.
It's mostly accurate in the US midd
Some cable user's machine running default-configured MS apps
is sending Paul dynamic DNS queries that it shouldn't,
because somehow it's decided he's got an interesting destination
(I'm guessing f.root-servers.net ?)
Paul wants the user to get an error popup about it.
Well, default-configured Mic
Are NANOG meetings webcasted? More specifically, Is NANOG29 going to be
webcasted/multicasted/netcasted?
Thanks,
William
--
William Caban <[EMAIL PROTECTED]>
Distributing an RBL list is the easy part. There are a
variety of methods in place that can provide sufficient
reliability and are sufficiently anonymous or difficult to attack,
such as Usenet and Freenet and Gnutella and probably Kazaa,
and it's not too hard to develop efficient data formats
f
e
> point of failure? Or any attackable entry?
>
>
>
> Disregard this if im totally out of line, but it would seem to me that this
> would be possible.
>
>
>
> Thanks,
>
> -Drew
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
? Is somebody working on an RFC?
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
Finder for commercial gain, it might even qualify for
the higher penalties (1 yr first offense 2 yr each subsequent
offense). I wonder if 'offense' would map to 'domain' or
'individual email message' or what. Conceivably could be
very very bad news.
-george william herbert
[EMAIL PROTECTED]
ntroduced by NSI, etc) this should be continued now and
NSI should not be allowed to use their registry services for commercial
activites going beyond what is necessary to keep the TLD registry running.
Sorry about long letter...
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
mpany and its a hard choice since both specifications are good
for future whois.
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
icann agreements) to move these
into separate, possibly non-profit company like it was done when Internic
(aka NSI) IP registration services were moved to ARIN.
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
the
technical or policy levels.
So my opinion goes from being my two cents to a consensus;
and I will act in those external arenas based on what I see
as a sufficiently wide consensus...
-george william herbert
[EMAIL PROTECTED]
I have noticed suddenly my virus filter catching more of those exact
same messages here in the last 24 hours.
David Lesher wrote:
I'm suddenly getting 3-4x the "M$ patch" and "bounced mail"
virus attacks as compared to 2-3 days ago.
Is this perhaps a result of VeriSlime's actions?
[Note I'm ta
Kandra didn't say that they CANNOT modify DNS responses, just that they were
not going to.
william
- Original Message -
From: <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Wednesday, September 17, 2003 1:13 PM
Subject: Re: Chang
s well
go way overboard.
william
- Original Message -
From: "Justin Shore" <[EMAIL PROTECTED]>
To: "Christopher X. Candreva" <[EMAIL PROTECTED]>
Cc: "Vadim Antonov" <[EMAIL PROTECTED]>; "Matt Larson"
<[EMAIL PROTECTED]>; <
D users). We are only
running BIND 8, and although I'm about to try 9 on our dedicated mail
recursor today ('cause we need this badly as our queues fill), I'm
reluctant to just toss it in customer facing recursors yet.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
Thank you. Unfortunately, the obvious didn't come anywhere near the
top of my query (and I intuitively tried www.root-servers.net).
Allan Liska wrote:
>
> http://www.root-servers.org/
>
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
Avleen Vig suggests that it's very wrong for Verisign's bad-domain catcher to
begin to accept SMTP messages and just reject all recipients with 550s
rather than rejecting the whole transaction with a 554.
I'm glad I'm not the only one who thinks that -
is there some conceivable case for which this
Can you also program something to do this for all root zones, i.e. something
like 'zone ".*" { type deligation-only; };'
And make it default configuration for new bind releases...
On 17 Sep 2003, Paul Vixie wrote:
>
> > Anyone have a magic named.conf incantation to counter the verisign
> > b
Googling around, I couldn't find a definitive list of the root-servers
owners. Any canonical method of determining which hints we should
remove? I'd like to drop them from our config files.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
The next version of the root-servers.net hints file should not have any
netSOL owned root servers in it. That will make the transition easier.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
os? (as in "how do I configure my router for that?" ;-)
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
Mike Damm wrote:
>
> Who's up for creating a network of new gTLD servers?
>...
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
of
the introduction, and it gets worse from there.)
> DNSsec will work properly with wildcards, regardless of where they are
> in the DNS.
Well, maybe. Only when the world changes to follow this internet-draft.
But at least it's good that somebody is thinking about it
--
s they keep prefixs
> > used in this really dumb idea for this idea.
>
> If you have a full table (i.e. no default) just drop inbound routes with a
> AS path _30060$
>
Are there any adverse side effects, that anybody can think of?
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
arring the 'root' nameservers with the same brush.
>
We are about to empirically determine the independence of the root
server operators.
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
g regarding Internet Domain Names.
-george william herbert
[EMAIL PROTECTED]
company to pull stunts of this nature
without appropriate warning and discussion.
-george william herbert
[EMAIL PROTECTED]
approach of the current Verisign
board of directors and their attempts to extract money in every possible
way related to .com/.net domains at the registry (verisign-grs) level because
they are loosing so many domain at the registry level to their competitors.
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
ing from somewhere last week,
>though I don't recall where. Probably Wired or the WSJ. Verisign wants
>the revenue that all those typos are generating. It's just the next shot
>in the eyeball war.
This is sufficiently technically and business slimy that
I would null-route that IP, personally.
-george william herbert
[EMAIL PROTECTED]
ed (and, presumably, actual hostile
activity were there to be such).
-george william herbert
[EMAIL PROTECTED]
I had the exact same problem. As soon as I turned it on, within minutes I
had customers calling that could no longer FTP into Win2k servers and some
that couldn't SSH into their Linux servers.
I've since turned it off as well.
Are there any other known ways to block this
Transit, mis-spoke.
william
- Original Message -
From: "Randy Bush" <[EMAIL PROTECTED]>
To: "William Devine II" <[EMAIL PROTECTED]>
Cc: <[EMAIL PROTECTED]>
Sent: Monday, September 08, 2003 3:15 PM
Subject: Re: Cable & Wireless, Verio and/
eir IP#'s from anything but somewhere in between it's getting
blocked. We use C&W directly and Verio/Level3 through a peer.
Thanks!
william
several new Windows security holes
were disclosed; and Jimmy Hoffa remains missing.
;-)
-george william herbert
[EMAIL PROTECTED]
I would think that any company that outsourced exchange services to another
entity would want either a VPN between their two offices or a direct PtP
link.
But I also know that the most logical method is not always understandable to
the pointy haired people.
william
- Original Message
http://www.pbs.org/cringely/pulpit/pulpit20010823.html
Pendergrass, Greg wrote:
Neither do we. Could you include some more details?
-Greg
-Original Message-
From: Austad, Jay [mailto:[EMAIL PROTECTED]
Sent: 29 August 2003 17:08
To: [EMAIL PROTECTED]
Subject: dry pair
Does anyone know
A 127.0.0.3
> *.*.*.* 1H IN A 127.0.0.4
>
>the result will be that only the top one will match:
I must hope and pray that nobody on NANOG would be foolish
enough to load narrative prose mailed to the list into their
BIND configurations ;-)
BGP, n
eir customers. And although it
> has been a while, I know I've seen a route-leak from 6461 at AMS-IX.
> (Probably last year sometime)
Indeed it really is a shame, especially when its large players like Qwest
who do not filter their customers, how can you expect it from smaller
Euro
out of will be difficult if not impossible.
IT IS VERY MUCH IN NETWORK OPERATORS
BEST INTEREST THAT THIS NOT HAPPEN.
Please take what measures are necessary to help
ensure that your customers are not intentionally
or neglegently DDOSing the BLs.
-george william herbert
[EMAIL PROTECTED]
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
The right answer for the original question is probably
"Buy an email server package with virus scanning hooks" or
"Get a virus scanner with sendmail milter hooks"
rather than specific details of how to set it...
The suggestion to do virus filtering
70] 04:33:44, MED 10, localpref 90
> AS path: 6453 209 11036 I
> > to 207.45.196.65 via so-1/2/0.0
>
> ...although both AS11036 (the origin) and AS6076 (one of the transits) are
> in the same geo area, one of them (voyager.net) was i thought out of business.
>
> am i being spammed from pirated address space?
>
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
ith electrical capacity in terms of the interchange
grids having N+1 or N+M capacity, and having systems with enough
robustness and graceful failure modes, and having systems with
enough reserve generation capacity are all legitimate. A lot of
other people are looking at that now, too.
But you
The following came through dshield which warns about new worm:
---
To: [EMAIL PROTECTED]
Subject: [Dshieldannounce] likely RPC worm captured. Moving to infocon 'yellow'
We received a copy of a binary that very much looks
like an RPC worm. Preliminary info:
- scans for port 135 as soon as it star
ansing and many other smaller cities in Michigan;
> Akron and Toledo, Ohio; and Ottawa and Montreal in Ontario.
> > At the moment the power outage encompasses:
> > New York City
> > Boston
> > Philadelphia
> > Detroit
> > Toronto
> > Ottowa
--
us know, because *nix
certainly ain't it. Doesn't matter how rabid a proponent of MS, or
Red Hat, or Sun, or SUSE you are, ignoring that fact is a quick way
to get rooted.
- --
William S. Duncanson[EMAIL PROTECTED]
The driving force behind the NC is the belie
I'd say keep it.
NANOG's archives at Merit are probably more stable than
many mailing list archives I've seen, but it's possible that
something will happen to it in the next 5-10 years that kills it.
Multiple copies of list archives aren't a bad thing,
at least for relatively low volume lists lik
According to http://isc.sans.org/diary.html?date=2003-08-11 ,
the worm uses the latest popular MS exploit ports, so
"* Close port 135/tcp (and if possible 135-139, 445 and 593) ".
It also uses TCP port and TFTP = UDP 69 to download its
attack code after getting the initial bootstrap
I tend to think of T1 and E1 connections as small
(STM1s are starting to be big :-).
It's easy enough to test them if there's something fast enough to test to.
The two kinds of tests your customers are likely to care about are
- Is your connection to them really the speed it should be?
- Do you
I do believe you're right about edge1 being new front Nick Geyer (who just
recently said he's done with ip hijackings and will be doing everything legit
and proper now - wonder if this can really be believed...). About Nick Geyer
and his associates, see http://www.completewhois.com/hijacked/gang
27;s using OTRS for customer support
services, both using MySQL as the database backend. I thought that was a
pretty good testament as well.
william
-Original Message-
From: ODHIAMBO Washington [mailto:[EMAIL PROTECTED]
Sent: Monday, August 04, 2003 8:32 AM
To: [EMAIL PROTECTED]
Cc: W
Is there a way to block html mail at the edge using a proxy ro something?
Scott Francis wrote:
On Fri, Aug 01, 2003 at 08:21:52AM -0400, [EMAIL PROTECTED] said:
Jack Bates Wrote:
In the US, the pipe is limited in any number of ways in attempts to
limit how many people share their broadb
I started using OTRS (Open Ticket Request System) a month or so ago and LOVE
IT. You can setup pre-canned response templates and have multiple users
login and maintain various queues. It's open source and works VERY well.
http://www.otrs.org/
william
-Original Message-
From: [
>From C&W in Houston
[EMAIL PROTECTED] root]# traceroute 206.103.37.166
traceroute to 206.103.37.166 (206.103.37.166), 30 hops max, 38 byte packets
1 GB-border1 (208.128.33.1) 0.433 ms 0.295 ms 0.229 ms
2 63-137-112-213 (63.137.112.213) 1.301 ms 1.166 ms 1.363 ms
3 bar2-serial4-0-0-8.
Which goes back to the root of the *real* problem here. Banks are mainly
concerned with physical security. Internet security has always been handled
as more of an afterthought and mainly for reasons of due diligence. The real
problem is the banks have a known security flaw with a simple password l
As Vadim said, it's about display of power.
However, I'm not worried about terrorists attacking infrastructure
under the cover of Presidential No-Fly Zones;
I'm more worried about backhoe drivers named Bubba
who didn't call the "Call Before You Dig" number
and weren't noticed by cable route overfl
e.
P.S. Maybe you should be honest about who you are and not post from free webmail
account.
And please do tell us which ip block you lost due to my efforts?
On Fri, 25 Jul 2003, Mike Jones wrote:
> William you have 2 /19's (64.68.0.0/19 and 216.151.192.0/19) i would like to see
> wh
RFC1918 is a wonderful document. It probably added 10-15 years
to the lifespan of the IPv4 address space, made IP addressing
much simpler for internal applications, and it's prevented
a large number of problems like people randomly making up addresses
for boxes they "know" that they'll "never" ne
terruptions of any kind :)
--
William Leibzon
Elan Networks
[EMAIL PROTECTED]
ndicated but not described.
I wasn't able to find a report on the web at the time, though.
I haven't gone back today and looked in more detail.
Phantom of the Backhoe?
-george william herbert
[EMAIL PROTECTED]
Anyone know how I can reach Michael Winslow (WilTel) today ?
Thanks,
Dee
It has been going on for a while. Trust whois.crsnic.net dates not the
ones displayed in registrar whois.
On Tue, 1 Jul 2003, Brad Killebrew wrote:
>
>
> Has anyone noticed that Netsol has fubared the creation dates for domains?
> I registered my first domain (cet.net) in May 1995, now it s
Must've been a doubly hard day huh?
william
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of
Callahan, Richard M, SOLGV
Sent: Friday, June 27, 2003 6:01 PM
To: Stephen Sprunk; LeBlanc, Robert
Cc: North American Noise and Off-topic Gripes; [EMAIL PROT
Jim wrote:
> One router and it takes there entire network off-line...
> Maybe someone needs a Intro to Networks 101 class.
I assume things are designed in such a way that if the router were
actually dead, the traffic would take an alternate route.
But the posting commented that they'd been sayin
Yes, it appears they had problems:
Power failure leads to BTo blackout
By Tim Richardson
Posted: 17/06/2003 at 11:46 GMT
http://theregister.com/content/22/31248.html
s.
Unless I'm mistaken (which is doubtfull considering how often I see whois
results with "no nameserver" in crsnic whois) this is not the case. In
fact I remember hearing about removing requirement to have two
nameservers back in 1999 when things where still being handled only by
N
For all top-level domains you can register a domain and not have any
name servers specified for it. In whois it'll say exactly that -
"no nameservers".
I'd be very much against removing these domains from root zones entirely,
but I maybe biased since I use these zone files for my own software.
If what they are doing is not ok, what would you propose?
Leaving dns hanging when domain is expired is not right either. Deleting
domains when some other domain is using dns host in it, will cause
problems for registry. They are doing best they can - fast rename and
delete domain, then slow n
sight into standard telco
engineering practices would be great and very much appreciated! Tnx.
-- _
__ __ ___ _| | William R. Lorenz <[EMAIL PROTECTED]>
\ V V / '_| | http://java.sun.com/; http://www.linux.org/
\./\./|_| |_| "[...] But it's turtles all the way down."
o, it's not only M$
and outlook. Why oh why are vendors shipping with defaults like no
restrictions on "buddy" downloads and execution?
--
William Allen Simpson
Key fingerprint = 17 40 5E 67 15 6F 31 26 DD 0D B9 9B 6A 15 2C 32
One more note -
While this would be the third time I'v seen lame.lamedelegation.org
with ip 1.1.1.1 I really do not know for sure if NSI is responsible or not.
It may very well have been actual previous domain owner who has incorrectly
registered host to such an address. I'd need to lookup
I commented on it once before on nanog actually...
Basicly LAME-DELEGATION.ORG is domain Network Solutions is using to move
old host records to. If they have a domain that is expiring and scheduled
for deletion and it has host records in .com or .net zones (so called
glue host records), then NS
that that can be
adapted to do what I wanted as well (if I needed it, which does not seem
necessary given number of alternatives). Thanks you for those as well.
Nanog community is really very helpfull. Please keep it up!
---
William Leibzon
Elan Communications Inc.
[EMAIL PROTECTED]
...
Reply off the list.
--
William Leibzon
Elan Communications Inc.
[EMAIL PROTECTED]
asourced.net - 208.160.112.2 which is actually
"m2.happiness-counseling.com (208.169.112.2)". Then do whois on
"happiness-counselling.com" and you'll get an idea. Again if you
need more info, just ask me or look up various various files at
http://openrbl.org/ip/208/169/112/13.htm
--
William Leibzon
Elan Communications Inc.
[EMAIL PROTECTED]
eply to this email on another mail list,
apologies to those who have see this twice)
---
William Leibzon
Elan Communications Inc.
[EMAIL PROTECTED]
Well as some of you know as of late I've been involved in investigations of
number of hijacked ip blocks (about 40 and looking at more) and can tell
you that for greater majority of companies (especially for companies that
had /16s but even for companies that had /24) the records on internet do
701 - 800 of 960 matches
Mail list logo